Consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time. a. Assume that an attacker has a special purpose application-specific integrated circuit (ASIC) which checks 5 · 108 keys per second, and she has a budget of $1 million. One ASIC costs $50, and we assume 100% overhead for integrating the ASIC (manufacturing the printed circuit boards, power supply, cooling, etc.). How many ASICs can we run in parallel with the given budget? b. Take into account advaancess in computer technology. Applying Moore's Law: Computer power doubles every T = 18 Months. While cost of ASIC's remain constant at $50 each. How many years do we have to wait until a key-search machine can be built for breaking AES with 128-bit with an average search time of 24 hours? Budget is still $1 million
Consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time.
a. Assume that an attacker has a special purpose application-specific integrated circuit (ASIC) which checks 5 · 108 keys per second, and she has a budget of $1 million. One ASIC costs $50, and we assume 100% overhead for integrating the ASIC (manufacturing the printed circuit boards, power supply, cooling, etc.). How many ASICs can we run in parallel with the given budget?
b. Take into account advaancess in computer technology. Applying Moore's Law: Computer power doubles every T = 18 Months. While cost of ASIC's remain constant at $50 each. How many years do we have to wait until a key-search machine can be built for breaking AES with 128-bit with an average search time of 24 hours? Budget is still $1 million
Trending now
This is a popular solution!
Step by step
Solved in 2 steps